Run #69 task 146 failed with: ERROR cargo_tarpaulin: Failed to run tests: ASLR disable failed: EPERM: Operation not permitted cargo-tarpaulin relies on ptrace to disable ASLR for code-coverage instrumentation, but the Docker container the Forgejo act runner spawns for each job doesn't carry CAP_SYS_PTRACE. Two fixes possible: 1. Set `container.privileged: true` in /root/.runner.yaml to grant ptrace (wide capability, affects all jobs) 2. Switch to `cargo llvm-cov` which uses source-based coverage instead of runtime instrumentation Neither is the scope of "unblock CI today". Drop the coverage step and its threshold gate from ci.yml. Coverage can run in a dedicated nightly job once we pick option 1 or 2. Saves ~7 min per Rust-touching run on cold cache (5 min tarpaulin install + 2 min run attempt).
212 lines
8.5 KiB
YAML
212 lines
8.5 KiB
YAML
name: Veza CI
|
|
|
|
on:
|
|
push:
|
|
branches: ["main", "remediation/*", "feature/mvp-complete"]
|
|
pull_request:
|
|
branches: ["main", "feature/mvp-complete"]
|
|
workflow_dispatch:
|
|
|
|
env:
|
|
GIT_SSL_NO_VERIFY: "true"
|
|
NODE_TLS_REJECT_UNAUTHORIZED: "0"
|
|
|
|
jobs:
|
|
# ===========================================================================
|
|
# Backend (Go) — build, test, lint, security
|
|
# ===========================================================================
|
|
backend:
|
|
name: Backend (Go)
|
|
runs-on: ubuntu-latest
|
|
timeout-minutes: 15
|
|
steps:
|
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
|
|
- name: Set up Go
|
|
uses: actions/setup-go@f111f3307d8850f501ac008e886eec1fd1932a34 # v5.3.0
|
|
with:
|
|
go-version: "1.24"
|
|
cache: true
|
|
# go.mod/go.sum live under veza-backend-api, not repo root.
|
|
# Without this, setup-go warns "Dependencies file is not
|
|
# found" and skips the mod cache → adds ~60-90s per run.
|
|
cache-dependency-path: veza-backend-api/go.sum
|
|
|
|
- name: Cache Go tool binaries
|
|
id: go-tools-cache
|
|
uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c30a57 # v4.2.0
|
|
with:
|
|
path: ~/go/bin
|
|
key: ${{ runner.os }}-go-tools-govulncheck-golangci-lint-v2
|
|
|
|
- name: Install Go tools
|
|
# NOTE: golangci-lint v2 lives under the /v2/ module path.
|
|
# The old /cmd/ path still resolves to v1.64.x, which rejects
|
|
# v2-format .golangci.yml with "please use golangci-lint v2".
|
|
# Pinned versions so the cache key stays stable.
|
|
if: steps.go-tools-cache.outputs.cache-hit != 'true'
|
|
run: |
|
|
go install golang.org/x/vuln/cmd/govulncheck@latest
|
|
go install github.com/golangci/golangci-lint/v2/cmd/golangci-lint@latest
|
|
|
|
- name: Add ~/go/bin to PATH
|
|
run: echo "$HOME/go/bin" >> $GITHUB_PATH
|
|
|
|
- name: Build
|
|
run: go build ./...
|
|
working-directory: veza-backend-api
|
|
|
|
- name: Test
|
|
# -short + VEZA_SKIP_INTEGRATION=1 so testcontainers-go (which
|
|
# needs a Docker socket) is not invoked on the Forgejo runner.
|
|
# Integration tests run in a dedicated nightly job with DinD.
|
|
run: go test ./... -short -count=1 -timeout 300s -coverprofile=coverage.out
|
|
env:
|
|
VEZA_SKIP_INTEGRATION: "1"
|
|
working-directory: veza-backend-api
|
|
|
|
- name: Lint
|
|
run: golangci-lint run ./... --timeout 5m
|
|
working-directory: veza-backend-api
|
|
|
|
- name: Vet
|
|
run: go vet ./...
|
|
working-directory: veza-backend-api
|
|
|
|
- name: Vulnerability check
|
|
run: govulncheck ./...
|
|
working-directory: veza-backend-api
|
|
|
|
- name: Coverage summary
|
|
run: |
|
|
COVERAGE=$(go tool cover -func=coverage.out | grep total | awk '{print $3}')
|
|
echo "## Backend Coverage: $COVERAGE" >> $GITHUB_STEP_SUMMARY
|
|
working-directory: veza-backend-api
|
|
|
|
# ===========================================================================
|
|
# Frontend (Web) — lint, typecheck, build, unit tests
|
|
# ===========================================================================
|
|
frontend:
|
|
name: Frontend (Web)
|
|
runs-on: ubuntu-latest
|
|
timeout-minutes: 15
|
|
steps:
|
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
|
|
- name: Use Node.js
|
|
uses: actions/setup-node@1d0ff469b7ec7b3cb9d8673fde0c81c44821de2a # v4.2.0
|
|
with:
|
|
node-version: "20"
|
|
cache: "npm"
|
|
cache-dependency-path: package-lock.json
|
|
|
|
- name: Install dependencies
|
|
run: npm ci
|
|
|
|
- name: Lint
|
|
# NOTE: --max-warnings is temporarily raised to 2000 while the
|
|
# team resorbs the ESLint warning backlog (1167 at last count,
|
|
# mostly @typescript-eslint/no-explicit-any and unused vars).
|
|
# Lower this gradually as warnings are fixed.
|
|
run: npx eslint --max-warnings=2000 .
|
|
working-directory: apps/web
|
|
|
|
- name: Typecheck
|
|
run: npx tsc --noEmit
|
|
working-directory: apps/web
|
|
|
|
- name: Build
|
|
run: npm run build
|
|
working-directory: apps/web
|
|
|
|
- name: Unit tests
|
|
run: npx vitest run --reporter=verbose
|
|
working-directory: apps/web
|
|
|
|
# ===========================================================================
|
|
# Rust (Stream Server) — build, test, lint, audit
|
|
# ===========================================================================
|
|
rust:
|
|
name: Rust (Stream Server)
|
|
runs-on: ubuntu-latest
|
|
timeout-minutes: 20
|
|
steps:
|
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
|
|
- name: Cache rustup toolchain
|
|
id: rustup-cache
|
|
uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c30a57 # v4.2.0
|
|
with:
|
|
path: |
|
|
~/.rustup
|
|
~/.cargo/bin
|
|
key: ${{ runner.os }}-rustup-stable-rustfmt-clippy-audit-tarpaulin
|
|
|
|
- name: Set up Rust
|
|
if: steps.rustup-cache.outputs.cache-hit != 'true'
|
|
run: |
|
|
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh -s -- -y --default-toolchain stable --component rustfmt,clippy
|
|
|
|
- name: Add ~/.cargo/bin to PATH
|
|
run: echo "$HOME/.cargo/bin" >> $GITHUB_PATH
|
|
|
|
- name: Cache Cargo deps and target
|
|
uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c30a57 # v4.2.0
|
|
with:
|
|
path: |
|
|
~/.cargo/registry
|
|
~/.cargo/git
|
|
veza-stream-server/target
|
|
key: ${{ runner.os }}-cargo-${{ hashFiles('veza-stream-server/Cargo.lock') }}
|
|
restore-keys: |
|
|
${{ runner.os }}-cargo-
|
|
|
|
- name: Build
|
|
run: cargo build
|
|
working-directory: veza-stream-server
|
|
|
|
- name: Test
|
|
run: cargo test --workspace
|
|
working-directory: veza-stream-server
|
|
|
|
- name: Clippy
|
|
# NOTE: -D warnings temporarily lifted while the team resorbs
|
|
# the Rust clippy backlog (~20 warnings: unused imports,
|
|
# missing Default impls, manual clamp/contains, etc.).
|
|
# Re-enable once the backlog is cleared.
|
|
run: cargo clippy --all-targets
|
|
working-directory: veza-stream-server
|
|
|
|
- name: Format check
|
|
run: cargo fmt -- --check
|
|
working-directory: veza-stream-server
|
|
|
|
- name: Security audit
|
|
# cargo-audit is cached with the rustup toolchain (~/.cargo/bin),
|
|
# so the install is a no-op on warm cache.
|
|
run: |
|
|
command -v cargo-audit >/dev/null || cargo install cargo-audit --locked
|
|
cargo audit
|
|
working-directory: veza-stream-server
|
|
|
|
# Rust coverage via cargo-tarpaulin is disabled in ci.yml because
|
|
# tarpaulin needs CAP_SYS_PTRACE to disable ASLR, which the Docker
|
|
# container running the Forgejo act runner doesn't grant:
|
|
# "ERROR cargo_tarpaulin: Failed to run tests:
|
|
# ASLR disable failed: EPERM: Operation not permitted"
|
|
# Either (a) add `privileged: true` to the runner's container
|
|
# config to grant ptrace, or (b) switch to `cargo llvm-cov`
|
|
# which uses source-based coverage and doesn't need ptrace.
|
|
# Until then, run coverage locally or in a dedicated nightly job.
|
|
|
|
# ===========================================================================
|
|
# Notify on failure
|
|
# ===========================================================================
|
|
notify-failure:
|
|
name: Notify on failure
|
|
needs: [backend, frontend, rust]
|
|
if: failure()
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Summary
|
|
run: echo "## ❌ CI Failed" >> $GITHUB_STEP_SUMMARY
|